2018
DOI: 10.1007/978-3-030-01446-9_23
|View full text |Cite
|
Sign up to set email alerts
|

BAdASS: Preserving Privacy in Behavioural Advertising with Applied Secret Sharing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(11 citation statements)
references
References 11 publications
0
11
0
Order By: Relevance
“…We have already introduced the composition θ i • σ i as the valuation of the buyers. We further show that user valuation satisfies the conditions for an elastic demand function, with valuations based on (11) and (12). We first note that, in general (and so we omit the subscript/superscript notation), the valuation of data quantity x ≥ 0 is given by,…”
Section: Remarkmentioning
confidence: 73%
See 1 more Smart Citation
“…We have already introduced the composition θ i • σ i as the valuation of the buyers. We further show that user valuation satisfies the conditions for an elastic demand function, with valuations based on (11) and (12). We first note that, in general (and so we omit the subscript/superscript notation), the valuation of data quantity x ≥ 0 is given by,…”
Section: Remarkmentioning
confidence: 73%
“…Finally, we mention that the concern of privacy is addressed in [11]. This paper addresses the problem of privacy between the web user and the advertiser, which is beyond the scope of this paper.…”
Section: Related Workmentioning
confidence: 99%
“…A meaningful attempt of combining differential privacy and recommendation algorithm has been made in our research. However, there are still a lot of open issues that are worth to be investigated in both fields of differential privacy and recommendation algorithms [22]. What is more, the application of differential privacy in recommendation algorithms other than userbased collaborative filtering algorithm will be further studied in our future research.…”
Section: Discussionmentioning
confidence: 99%
“…e scholars have consistently put the confidentiality, integrity, and availability of data security in the blockchain system [24] at the top of the list. However, most scholars focus on the study of data security confidentiality [25,26], ignoring that data integrity is more important in the business field.…”
Section: Blockchain Technology Blockchainmentioning
confidence: 99%